LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of Tenable
    Security FirmsReportingApplication SecurityInfrastructure Security
    Visit Website

    Tenable

    Details

    Tenable's exposure management platform helps organizations find, prioritize, and fix cyber risks across IT, cloud, OT, and identity environments.

    APIReportWebServicesExternal+3
    • Previous
    • 1
    • More pages
    • 26
    • 27
    • 28
    • More pages
    • 33
    • Next
    image of Terra Security
    AI SecurityApplication SecurityAPI SecurityVulnerability IntelligenceRed Team OperationsReportingCloud Security
    Visit Website

    Terra Security

    Details

    Agentic AI-powered continuous penetration testing as a service (PTaaS) platform that combines AI scale with human supervision.

    AIAPIWebReportCloud+3
    image of Threat Dragon
    Application Security
    Visit Website

    Threat Dragon

    Details

    OWASP Threat Dragon is a free, open-source threat modeling tool for creating threat model diagrams and listing threats.

    Static Analysis
    image of Titus
    Application SecurityAPI Security
    Visit Website

    Titus

    Details

    Titus is a high-performance secrets scanner that detects and validates leaked credentials in code, binaries, and HTTP traffic for offensive engagements.

    Static AnalysisAPIWebMobileExternal
    image of Truffle Security
    Application SecurityCloud Security
    Visit Website

    Truffle Security

    Details

    Truffle Security provides open-source and enterprise solutions for detecting and remediating leaked keys and credentials across the SDLC.

    WebBug BountyCloud
    image of TryHackMe
    Training
    Visit Website

    TryHackMe

    Details

    TryHackMe is an online platform that teaches cyber security through hands-on labs and virtual machines.

    TrainingWebCertifications
    image of USB-WiFi
    Wireless Security
    Visit Website

    USB-WiFi

    Details

    A GitHub repository providing USB WiFi adapter information for Linux, focusing on compatibility and recommendations for Kali Linux users.

    Wireless
    image of Unleashed Firmware
    Wireless Security
    Visit Website

    Unleashed Firmware

    Details

    Custom firmware for Flipper Zero with added features, improved components, and full API compatibility for experimental purposes.

    Wireless
    image of VIPER
    Red Team Operations
    Visit Website

    VIPER

    Details

    VIPER is a powerful and flexible red team platform designed for adversary emulation and red team operations across various platforms.

    InternalExternalReport
    image of VirusTotal
    Reverse Engineering
    Visit Website

    VirusTotal

    Details

    VirusTotal is a service that analyzes files, URLs, domains, and IPs for malicious content using antivirus engines and threat intelligence feeds.

    Static Analysis
    Screenshot of Voyage
    Reconnaissance
    Visit Website

    Voyage

    Details

    Voyage is a Rust-based subdomain enumeration tool with active/passive methods, SQLite progress tracking, and a real-time terminal UI.

    Bug BountyWebExternal
    image of VulDB
    Vulnerability Intelligence
    Visit Website

    VulDB

    Details

    VulDB is a comprehensive vulnerability management and threat intelligence platform, documenting and analyzing security vulnerabilities since 1970.

    Vulnerability Intelligence